Ransomware 101: Keeping the lights on when hackers attack
Ransomware attackers are reliant on a business’ inability to recover. In this article, Christopher Rogers from Zerto explains what companies can do to prioritize recovery.
Read more...Ransomware attackers are reliant on a business’ inability to recover. In this article, Christopher Rogers from Zerto explains what companies can do to prioritize recovery.
Read more...Criminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it
Read more...With seemingly no end to the growing problem of cyberattacks in sight, the cybersecurity industry is increasingly looking to address the root of the problem; humans.
Read more...Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.
Read more...Today marks the 4th anniversary of GDPR. We spoke to eight experts and asked them, what changes the regulation brought.
Read more...In 2017 the largest ransomware attack in history – WannaCry – swept across the globe, infecting a quarter million machines in more than 150 countries. What lessons can be drawn from the attack, and how can businesses keep their systems secure?
Read more...One year ago Colonial Pipeline – the largest fuel pipeline in the US – suffered a ransomware attack. Cyber Protection Magazine speaks to three cybersecurity experts to learn what organisations can still do to prevent themselves from becoming the next victim.
Read more...Women’s privacy is at risk unless they adopt a Zero-Trust philosophy to digital media. Doing so does not require deep technical knowledge. The tools to protect themselves are available and free.
Read more...Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.
Read more...Cybersecurity is a mystery to most people and organizations and the industry isn’t very helpful in clearing that up. Zero Trust (ZT) is a good first step but it, too, is a black hole of confusing information. But there are some individuals that are blazing a trail to ZT.
Read more...